(navigation image)
Home Animation & Cartoons | Arts & Music | Community Video | Computers & Technology | Cultural & Academic Films | Ephemeral Films | Movies | News & Public Affairs | Prelinger Archives | Spirituality & Religion | Sports Videos | Television | Videogame Videos | Vlogs | Youth Media
Search: Advanced Search
Anonymous User (login or join us)
Upload

View movie

item imageitem imageitem imageitem image

View thumbnails

Play / Download (help[help])

(212.8 M)Ogg Video
(300.1 M)h.264
(504.1 M)QuickTime


All Files: HTTPS Torrent (2/0)
[Attribution-Share Alike 3.0]

Resources

Bookmark

Gananand KiniDay 1 Part 1: Introduction to ARM

something has gone horribly wrong 8-p
Prefer flash? · Embed · Questions/Feedback?

Class materials at http://www.OpenSecurityTraining.info/IntroARM.html
Follow us on Twitter for class news @OpenSecTraining.

ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand, optimize and debug software stacks running on them. This class builds on the Intro to x86 class and tries to provide parallels and differences between the two processor architectures wherever possible while focusing on the ARM instruction set, some of the ARM processor features, and how software works and runs on the ARM processor. 
 
In order to demonstrate these features, labs are made available as part of a virtual environment with an ARM emulator run using QEMU. These labs include:
- A simple fibonacci sequence generator in assembly that demonstrates use of recursion with the use of control flow instructions such as bl, beq, the cmp instruction, arithmetic operations such as add, subs and finally stack operation using push and pop.
- An ARM version of the CMU Bomb Lab from CMU's Introduction to Computer Systems class that demonstrates the use of the GNU Debugger for reverse engineering binaries on the ARM platform.
- A simple Interrupts lab that demonstrates the implementation of an emulated IRQ interrupt handler in QEMU where we take keyboard input and add 1 to the character and then output it.
- A control flow hijack lab where we perform the same hijack demonstrated by Itzhak Avraham at Blackhat in 2012 using Return-Oriented-Programming (ROP) in the ARM emulator
- An Atomic instructions lab where we implement a sample mutex in conjunction with an application using threading to emulate atomic instructions that are included with the ARM instruction set.
Intro x86 is a pre-requisite to this class and will help in understand the similarities and differences between the two architectures as well as understand some of the basic program operations that work similarly on both platforms.


This movie is part of the collection: OpenSecurityTraining.info

Producer: Gananand Kini
Audio/Visual: sound, color
Keywords: OpenSecurityTraining.info; ARM; Acorn RISC Machine; Advanced RISC Machine; assembly; disassembly; reverse engineering; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes

Creative Commons license: Attribution-Share Alike 3.0


Individual Files

Movie Files QuickTime h.264 Ogg Video
PR_IntroARM-D1P1.mov 504.1 MB 
300.1 MB 
212.8 MB 
Image Files Thumbnail Animated GIF
PR_IntroARM-D1P1.mov 5.1 KB 
321.9 KB 
Information FormatSize
Day1Part1IntroductionToArm_files.xml Metadata [file] 
Day1Part1IntroductionToArm_meta.xml Metadata 3.1 KB 
Other Files Archive BitTorrent
Day1Part1IntroductionToArm_archive.torrent 41.7 KB 

Be the first to write a review
Downloaded 2,043 times
Reviews